General
-
Target
JaffaCakes118_042f4dba582ec8c8e5d836a08885726c
-
Size
409KB
-
Sample
250112-b9b4laspan
-
MD5
042f4dba582ec8c8e5d836a08885726c
-
SHA1
5832a1c77a4a9d11ccbbe9a009c09a15d9bcbb03
-
SHA256
763b9fe1f721e5ff15049e1920b2faf7d09dd9531e96c97597bacf0da57a0659
-
SHA512
c1e723c27cfff6835a58b8952354bc2d943db573df9122c30515820252cde4adebc3a982be15c890c5ab7ab862082007abf399e02e790d25ed5f50b8f6c0bc6f
-
SSDEEP
6144:HbbzaLfgYSrm1ttUdzUdJgYSrm1ttUdzUdnzW7z4ipOIf1rB0+oHK+wgLE6y/zV:7b4fRSECOJRSECOnz0TVlBPD1BzV
Behavioral task
behavioral1
Sample
JaffaCakes118_042f4dba582ec8c8e5d836a08885726c.exe
Resource
win7-20240903-en
Malware Config
Extracted
cybergate
2.3
vítima
server114.zapto.org:8080
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
msnmsgr.exe
-
install_dir
install
-
install_file
iexplorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Emoticones han sido instalados correctamente, gracias por usar nuestro producto!
-
message_box_title
Emoticones!
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Targets
-
-
Target
JaffaCakes118_042f4dba582ec8c8e5d836a08885726c
-
Size
409KB
-
MD5
042f4dba582ec8c8e5d836a08885726c
-
SHA1
5832a1c77a4a9d11ccbbe9a009c09a15d9bcbb03
-
SHA256
763b9fe1f721e5ff15049e1920b2faf7d09dd9531e96c97597bacf0da57a0659
-
SHA512
c1e723c27cfff6835a58b8952354bc2d943db573df9122c30515820252cde4adebc3a982be15c890c5ab7ab862082007abf399e02e790d25ed5f50b8f6c0bc6f
-
SSDEEP
6144:HbbzaLfgYSrm1ttUdzUdJgYSrm1ttUdzUdnzW7z4ipOIf1rB0+oHK+wgLE6y/zV:7b4fRSECOJRSECOnz0TVlBPD1BzV
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-